Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

double encryption

Posted on 2011-09-09
7
Medium Priority
?
424 Views
Last Modified: 2012-05-12
Is there any benefits in enforcing double encryption on my corproatye laptop.

Let me explain - all laptop devices come with pointsec installed - yet I sometimes have to store quite sensitive data locally on my device - could I not put something like truecrypt on and then encrypt these files when they are saved locally.

My fear is when I logon to truecrypt I essentially "unencrypt" eevrything - but I cant quite get my head around how encrypting certain files again really improves things.
0
Comment
Question by:pma111
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
7 Comments
 
LVL 9

Assisted Solution

by:akitsupport
akitsupport earned 400 total points
ID: 36509273
In many ways your just doubling up.  If the main solution your using is good enough why use another?

You could also end up with one item causing issues with the other as well.

0
 
LVL 3

Author Comment

by:pma111
ID: 36509350
I was wondering perhaps if I got infected by malware - as I unencrypt when I boot my machine with pointsec - the malware could see / send any documents - anything sensitive should remain encrypted "always" unless specifically needed, whereas pointsec opens "all my files" when I authenticate" - truecrypt would keep those high sensitive ones encrypted unless I manually mounted that file via authentication
0
 
LVL 9

Expert Comment

by:akitsupport
ID: 36509400
I would think as you have an encryption software your using a good anti virus though?

I'd consider using malwarebytes in conjunction with what you ahve if your really worried.

0
Looking for the Wi-Fi vendor that's right for you?

We know how difficult it can be to evaluate Wi-Fi vendors, so we created this helpful Wi-Fi Buyer's Guide to help you find the Wi-Fi vendor that's right for your business! Download the guide and get started on our checklist today!

 
LVL 3

Author Comment

by:pma111
ID: 36509837
Yeah I guess I am overparanoid
0
 
LVL 32

Accepted Solution

by:
aleghart earned 800 total points
ID: 36512312
It's not overly paranoid.  Once you logon to the OS, your user credentials can be used by anyone with local or remote access.  This means your local files (even if encrypted by the OS), your network files, even connections to network servers & workstations...because your logon credentials are unlocked and used without challenge.

Decent password protection software offers the ability to challenge before using the credentials.  LastPass, for instance, can logon to a site or show locked info automatically, or only after a password challenge.

Same can be done for your sensitive files.  3rd-party encryption (even as simple as a ZIP file) would decrease exposure.  It wouldn't stop somebody from stealing your files if you were hacked or forced to logon to your computer.  But, you would have an amount of time you could reasonably expect some of that data to be safe.  This gives you the chance to make the data irrelevant, or at least take measures to warn others and secure other assets against the breach.

Traveling internationally, your computer is subject to seizure and search.  You may be required to logon to your computer or face detention.  Your computer can also be confiscated for later search.  (This is for the U.S. ...your country may vary.)
0
 
LVL 9

Assisted Solution

by:gtkfreak
gtkfreak earned 400 total points
ID: 36515177
Double encryption offers one more layer of protection. therefore, at times i too do that. You can also have truecrypt encryption for the whole volume, and within that one more layer of encryption on some truecrypt containers that have sensitive files. End of day, once you log into to your system, anything going across a network will be unencrypted or plaintext. Just an additional encryption layer on sensitive files.

During travel, you are required to enter a password to allow law enforcement to search your computer, but an additional encrypted container may not require you to enter that password, unless it is detected during the search. However, truecrypt does offer hidden volumes to help avoid detection. The operative word is avoid and not evade.
0
 
LVL 12

Assisted Solution

by:coredatarecovery
coredatarecovery earned 400 total points
ID: 36515228
Truecrypt is a great solution in this case
0

Featured Post

Enroll in October's Free Course of the Month

Do you work with and analyze data? Enroll in October's Course of the Month for 7+ hours of SQL training, allowing you to quickly and efficiently store or retrieve data. It's free for Premium Members, Team Accounts, and Qualified Experts!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Sometimes Administrators rights are not enough. These cases call for the SYSTEM account. The process in this article outlines the steps required to execute commands using the SYSTEM account.
Hey fellow admins! This time, I have a little fairy tale for you. As many tales do, it starts boring and then gets pretty gory. I hope you like it. TL;DR: It is about an important security matter, you should read it if you run or administer Windows …
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

609 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question